Energy-Efficient Security Threshold Determination Method for the Enhancement of Interleaved Hop-By-Hop Authentication

Size: px
Start display at page:

Download "Energy-Efficient Security Threshold Determination Method for the Enhancement of Interleaved Hop-By-Hop Authentication"

Transcription

1 Vol. 9, No. 12, 218 Energy-Efficient Security Threshold Determination Method for the Enhancement of Interleaved Hop-By-Hop Authentication Ye Lim Kang 1, Tae Ho Cho *2 Department of Electrical and Computer Engineering Sungkyunkwan University Suwon, Republic of Korea Abstract Wireless sensor networks allow attackers to inject false reports by compromising sensor nodes due to the use of wireless communication, the limited energy resources of the sensor nodes, and deployment in an open environment. The forwarding of false reports causes false alarms at the Base Station and consumes the energy of the sensor nodes unnecessarily. As a defense against false report injection attacks, interleaved hop-by-hop authentication was proposed. In interleaved hop-by-hop authentication, the security threshold is a design parameter that influences the number of Message Authentication Codes; the sensor nodes must verify, based on the security requirements of the application and the node density of the network. However, interleaved hop-by-hop authentication fails to defend against false report injection attacks when the number of compromised sensor nodes exceeds the security threshold. To solve this problem, in this paper we propose a security scheme that adjusts the security threshold according to the network situation using an evaluation function. The proposed scheme minimizes the energy consumption of the sensor nodes and reinforces security. Keywords Component; wireless sensor networks; false report injection attack; network security; interleaved hop-by-hop authentication I. INTRODUCTION Wireless Sensor Networks (WSNs) are densely deployed with many sensor nodes and use wireless communication [1]. WSNs are used in various applications that require real-time observation, such as fire detection and enemy movement detection [2]. For this reason, it is important to transmit accurate information to the Base Station (). Security is an essential consideration in WSNs. WSNs are extremely vulnerable to false report injection attacks, due to their use of wireless communication, their deployment in open environments, and the limited energy resources of the sensor nodes [3-4]. In a false report injection attack, an attacker injects a false report into a WSN by compromising certain sensor nodes. The causes false alarms upon receiving false reports. In addition, the forwarding of false reports unnecessarily consumes the energy of the sensor nodes. Therefore, false reports must be detected early and dropped before they arrive at the. As a defense against false report injection attacks, Z. Sencun, S. Sanjeev, J. Sushil., N. Peng proposed Interleaved Hop-by-hop Authentication (IHA) [5-6]. IHA is a security protocol in which sensor nodes detect and drop false reports during transmission if the number of compromised nodes does not exceed a certain Security Threshold (T). IHA is used when strong security is desired because it involves two-step report verification with one-hop neighbors and T+1-hop neighbors. However, IHA does not defend against false report injection attacks when the number of compromised nodes exceeds T. In this paper, we propose a security scheme that determines a suitable T according to the network situation by means of an evaluation function. The resets T according to the network situation and alters the number of Message Authentication Codes (MACs) to be included in the report. By resetting T, it is possible to defend against false report injection attacks when the number of compromised nodes exceeds T. As a result, the proposed scheme improves the total energy efficiency of the network and reinforces security. The composition of this paper is as follows. In Section 2, false report injection attacks and IHA are described. In Section 3, the proposed scheme is described. Section 4 illustrates the performance of the proposed scheme through experimental results. In Section 5, conclusions are drawn. II. RELATED WORK A. False Report Injection Attacks Fig. 1 depicts a false report injection attack in a WSN. An attacker compromises sensor nodes and obtains an authentication key. Then, the attacker generates a false report about an event that did not occur using the acquired authentication key. This causes a false alarm at the, and the sensor nodes consume energy unnecessarily during the transmission of false reports. There are various security protocols to defend against such attacks, including Dynamic En-route Filtering (DEF) and Probabilistic Voting-based Filtering (PVFS) [7-8]. 145 P a g e

2 Vol. 9, No. 12, 218 Energy Waste message using pairwise keys shared with the cluster nodes. If the endorsement message is authenticated, the CH generates an event report including the MAC, and transmits it toward the. False Alarm 4) En-route Filtering Fig. 3 depicts en-route filtering in IHA. The node receiving a report from the CH verifies the report using a pairwise key shared with its downstream node. Then, the node checks the number of pairwise MACs within the report. The node verifies the last MAC within the pairwise MAC list of the report using the pairwise key shared with its lower association node. If the verification succeeds, the last MAC is eliminated from the pairwise MAC list. The node generates a MAC using the pairwise key shared with its upper association node and adds it to the beginning of the pairwise MAC list of the report. Then, the report is transmitted to the next node. All forwarding nodes repeat the same process. Fig. 1. False Report Injection Attack T=3 B. IHA 1) Node Initialization and Deployment The key server is located at the and distributes and manages keys. The key server preloads unique integer IDs and individual keys onto all nodes. After node deployment, all the nodes discover one-hop neighbor nodes and establish pairwise keys with them [9-1]. 2) Association Discovery Fig. 2 displays the Association Discovery step, in which all nodes discover the IDs of association nodes. For the initial path setup, there are association discovery steps, such as Hello and Cluster Acknowledgement [11]. The Hello step allows the node to discover an upper association node. The broadcasts a Hello message. The node receiving the Hello message discovers the ID of a T+1-hop upper association node within the path. The Cluster Head (CH) receiving the Hello message allocates T+1 IDs to the cluster nodes. The Cluster Acknowledgement (ACK) step allows the node to discover a lower association node. After the Hello step, the CH transmits ACK toward the. The node receiving ACK discovers the ID of a T+1-hop lower association node. Fig. 2. Association Discovery 3) Report Endorsement If an event occurs, the cluster nodes generate an endorsement message including the MAC, and transmit it toward the CH. The CH authenticates the endorsement T=3 Detected and Dropped Fig. 3. En-route Filtering 5) Verification If a report arrives at the, the verifies the compressed individual MACs [12]. The computes T+1 MACs about the event using the authentication keys of the nodes in the ID list of the report. Then, the determines whether or not these MACs match the individual MACs within the report. If the verification succeeds, the report is authenticated. However, if the verification fails, the report is discarded. III. PROPOSED SCHEME A. Problem Statement IHA is an effective security protocol that defends against false report injection attacks. However, it has several problems. 1) IHA loses en-route filtering during false report injection attacks when the number of compromised nodes exceeds T. The event data of a false report that the number of compromised nodes exceeds T are false, but the report is composed of normal MACs. There are not methods to detect and drop such reports before the receives them. 2) In IHA, if the node receives a report, the node goes through a verification process with its T+1-hop neighbor node in addition to its one-hop neighbor node. IHA has powerful security, but the energy of the sensor nodes is consumed much more than with other security protocols. To solve these problems, we propose the following solutions 146 P a g e

3 Vol. 9, No. 12, 218 3) The network administrator presets standard range of event data values of a normal report. The judges that a received report is false if it deviates from the standard range of a normal report set by the network administrator. 4) The minimizes the energy consumption of the sensor nodes as much as possible by determining the suitable T according to the network situation. B. Assumptions We assume the energy of the sensor nodes is not limited. We assume the is not compromised. C. Proposed Scheme 1) Factors Considered to Determine T Fig. 4 demonstrates that after the resets T based on the False Traffic Ratio (FTR), Residual Energy of the Node (REN), and Max Hop Count (MHC), it broadcasts T. The evaluation function is executed whenever the number of received reports is 1. The performs the evaluation function considering the cluster in which the FTR is the largest and the REN is the smallest among the clusters in which the false report injection attack has occurred. The evaluation function is not executed if T is changed from the initially set T to a new T. The node detecting the false report deletes the false MAC without discarding the false report, and forwards the false report to the by adding the pairwise MAC of its upper association node. The can determine the number of compromised nodes and their IDs using this received false report. The determines the value to which it should reset T according to the number of compromised nodes. T should be reset to a value equal to the number of compromised nodes or greater than the number of compromised nodes. If all the nodes receive a broadcasting message to reset T from the, all the nodes will stop transmitting false reports after detecting them. Once T is reset, all the nodes operate by detecting and dropping false reports, as in existing IHA. Table 1 displays the output according to the inputs of the evaluation function. If the FTR is -1% and the REN is - 1%, the resets T to a value smaller than the initially set T through the evaluation function. Then, the broadcasts T. At this time, the execution condition of the evaluation function is that the number of compromised nodes is smaller than the initially set T. This minimizes unnecessary energy consumption by the sensor nodes. If the FTR is 11-1% and the REN is -1%, the resets T to a value greater than the initially set T through the evaluation function. Then, the broadcasts T. At this time, the execution condition of the evaluation function should be the situation of a false report injection attack when the number of compromised nodes exceeds the initially set T. In other words, the restores en-route filtering by resetting T to a value greater than the initially set T. Therefore, false reports are dropped before they arrive at the. Thus, it is possible to defend against attacks that cannot be defended against by the existing IHA. Determining the suitable T involves adjusting T differently in various network situations, such as attack situations. ~1 11~1 TABLE I. EVALUATION FUNCTION Input REN(%) ~1 ~1 11~21 11~21 22~1 MHC 22~1 ~1 ~1 11~21 11~21 22~1 22~1 Output T Down 2) Reassociation Setup of Nodes The broadcasts the new T to all the nodes when T is reset as a result of the evaluation function. Fig. 5 depicts the process in which all the nodes reset T+1 association node pairwise keys with the new T. For example, if T is changed from 3 to 4, node resets its upper association node pairwise key from to. Up Input FTR REN MHC Evaluation Function Output T resetting 3 4 T=3 CH Fig. 4. Interleaved Hop-by-hop Authentication Using the Evaluation Function Evaluation function (1) determines whether to reset T based on the FTR, REN, and MHC of Path (P). ( ) ( ) ( ) ( ) ( ) IV. Fig. 5. Reassociation Setup PERFORMANCE EVALUATION A. Experimental Environment The experimental environment is as follows: 2 nodes are randomly deployed in the sensor field, which is 1 x 1 in size, and 2 events are generated. The is positioned at (x, y = 1, 1) of the sensor field. The energy required to transmit 1 byte is µj, and the energy required to receive 1 byte is 12.5 µj [13]. The energy required to verify a MAC is 75 µj, and the energy required to generate a 147 P a g e

4 Energy Consumption(mJ) Improvement(%) Energy Consumption(mJ) Improvement(%) Number of Dropped False Reports (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 9, No. 12, 218 MAC is 15 µj [14]. The size of a MAC is 1 byte and the size of the original report is 12 bytes. The size of the Hello Message is 3 bytes [15]. The initial energy resource of the nodes is 1 J. B. Experimental Results Fig. 6 displays the total energy consumption of the network according to the FTR in the situation of a false report injection attack when the number of compromised nodes is less than T. To demonstrate the energy efficiency of the proposed scheme, we generated 2 events at random positions and analyzed the total energy consumption of the sensor nodes. As the FTR increases, the total energy consumption decreases. IHA maintains the initially set T. In the proposed scheme, the changes its broadcast value from the initially set T to the reduced T if the FTR is -1% and the REN is -1%. Comparing IHA and the proposed scheme, when the FTR is 1%, the energy efficiency is improved by up to 27.17%, as shown in Fig. 6. Fig. 8 displays the number of dropped false reports according to the FTR in the situation of a false report injection attack when the number of compromised nodes exceeds T. To demonstrate the security of the proposed scheme, we generated 2 events at random positions and analyzed the number of dropped false reports. IHA maintains % en-route filtering, while the proposed scheme progressively improves en-route filtering as the FTR increases. Thus, the security of the proposed scheme is better than that of IHA IHA Proposed Scheme Fig. 8. Number of Dropped False Reports versus the FTR IHA Proposed Scheme Improvement(%) Fig. 6. Energy Consumption versus the FTR when the number of compromised nodes is less than T. Fig. 7 displays the total energy consumption of the network according to the FTR in the situation of a false report injection attack when the number of compromised nodes exceeds T. IHA maintains the initially set T. In the proposed scheme, when the FTR is 11-1% and the REN is -1%, the changes its broadcast value from the initially set T to the increased T. Comparing IHA and the proposed scheme, when the FTR is 9%, the energy efficiency increases by up to 24.18%, as shown in Fig IHA Proposed Scheme Improvement(%) Fig. 7. Energy Consumption versus the FTR when the number of compromised nodes exceeds T V. CONCLUSIONS WSNs are vulnerable to false report injection attacks. IHA is an effective security protocol to defend against false reports. However, with IHA, it is impossible to defend against false report injection attacks when the number of compromised nodes exceeds T. In this paper, we proposed a WSN security scheme that adjusts T according to the network environment. When sensor nodes detect a false report that the number of compromised nodes is less than T, the reduces T and prevents unnecessary energy use by the sensor nodes through the evaluation function. The broadcasts an increased value of T when the sensor nodes detect a false report that the number of compromised nodes exceeds T. Therefore, en-route filtering is restored, security is enhanced compared to the existing IHA, and unnecessary energy wasting by the sensor nodes is prevented because false reports are discarded in advance. However, in the node initialization deployment step, all the nodes have many keys, so much of the memory of the sensor nodes is consumed. Therefore, in the proposed scheme, costs increase because expensive sensor nodes must be used. Through this experiment, we have demonstrated the performance improvement of the proposed scheme compared with IHA. ACKNOWLEDGMENT This research was supported by the MISP (Ministry of Science, ICT & Future Planning), Korea, under the National Program for Excellence in SW) ( ) supervised by the IITP (Institute for Information & communications Technology Promotion)" ( ) REFERENCES [1] A. Ian F., S. Weilian, S. Yogesh, C. Erdal, "A survey on sensor networks." IEEE communications magazine 4.8 (22): P a g e

5 Vol. 9, No. 12, 218 [2] A. K.Jamal N., and K. AHMED E. "Routing techniques in wireless sensor networks: a survey." IEEE wireless communications 11.6 (24): [3] Jeba, S. A., and B. Paramasivan. "False data injection attack and its countermeasures in wireless sensor networks." European Journal of Scientific Research 82.2 (212): [4] K. Chris, and W. David. "Secure routing in wireless sensor networks: Attacks and countermeasures." Sensor Network Protocols and Applications, 23. Proceedings of the First IEEE. 23 IEEE International Workshop on. IEEE, 23. [5] Z. Sencun, S. Sanjeev, J. Sushil., N. Peng, "An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks." Security and privacy, 24. Proceedings. 24 IEEE symposium on. IEEE, 24. [6] Z. Sencun, and N. Peng. "Interleaved hop-by-hop authentication against false data injection attacks in sensor networks." ACM Transactions on Sensor Networks (TOSN) 3.3 (27): 14. [7] Y. Zhen, and G. Yong. "A dynamic en-route filtering scheme for data reporting in wireless sensor networks." IEEE/ACM Transactions on Networking (ToN) 18.1 (21): [8] L. Feng, S. Avinash and W. Jie. "PVFS: a probabilistic voting-based filtering scheme in wireless sensor networks." International Journal of Security and Networks 3.3 (28): [9] Z. Sencun, S. Sanjeev, and J. Sushil. "LEAP+: Efficient security mechanisms for large-scale distributed sensor networks." ACM Transactions on Sensor Networks (TOSN) 2.4 (26): [1] B. Carlo, S. Alfredo De, H. Amir, K. Shay, V. Ugo, Y. Moti, "Perfectlysecure key distribution for dynamic conferences." Annual international cryptology conference. Springer, Berlin, Heidelberg, [11] W. Yong, A. Garhan, and R. Byrav. "A survey of security issues in wireless sensor networks." (26). [12] B. Mihir, G. Roch, and R. Phillip. "XOR MACs: New methods for message authentication using finite pseudorandom functions." Annual International Cryptology Conference. Springer, Berlin, Heidelberg, [13] P. Dongjin, and C. Taeho. "A Fuzzy Rule-based Key Re-Distribution Decision Scheme of Dynamic Filtering for Energy Saving in Wireless Sensor Networks." International Journal of Information Technology and Computer Science (IJITCS) 9.4 (217): 1-8. [14] Y. Fan, L. Haiyun, L. Songwu, Z. Lixia, "Statistical en-route filtering of injected false data in sensor networks." IEEE Journal on Selected Areas in Communications 23.4 (25): [15] R. Sajjad, Q. Hassaan Khaliq, K. Syed Ali, R. Veselin, R. Muttukrishnan, "A1: An energy efficient topology control algorithm for connected area coverage in wireless sensor networks." Journal of Network and Computer Applications 35.2 (212): l 149 P a g e

SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING IN WIRELESS SENSOR NETWORKS USING FUZZY LOGIC

SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING IN WIRELESS SENSOR NETWORKS USING FUZZY LOGIC SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING IN WIRELESS SENSOR NETWORKS USING FUZZY LOGIC Su Man Nam and Tae Ho Cho College of Information and Communication Engineering,

More information

MODELING AND SIMULATION OF THRESHOLD ANALYSIS FOR PVFS IN WIRELESS SENSOR NETWORKS

MODELING AND SIMULATION OF THRESHOLD ANALYSIS FOR PVFS IN WIRELESS SENSOR NETWORKS Science MODELING AND SIMULATION OF THRESHOLD ANALYSIS FOR PVFS IN WIRELESS SENSOR NETWORKS Tae Ho Cho *1, Su Man Nam 2 *1 College of Software, Sungkyunkwan University, KOREA 2 College of Information and

More information

A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS

A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS Su Man Nam 1 and Tae Ho Cho 2 1 College of Information and Communication

More information

ENSF: ENERGY-EFFICIENT NEXT-HOP SELECTION METHOD USING FUZZY LOGIC IN PROBABILISTIC VOTING-BASED FILTERING SCHEME

ENSF: ENERGY-EFFICIENT NEXT-HOP SELECTION METHOD USING FUZZY LOGIC IN PROBABILISTIC VOTING-BASED FILTERING SCHEME ENSF: ENERGY-EFFICIENT NEXT-HOP SELECTION METHOD USING FUZZY LOGIC IN PROBABILISTIC VOTING-BASED FILTERING SCHEME Jae Kwan Lee 1 and Tae Ho Cho 2 1, 2 College of Information and Communication Engineering,

More information

WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGIC

WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGIC International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 5, October 2017 WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGIC Sang-Hyeok Lim 1 and Tae-Ho Cho 2 1 College of

More information

Sungkyunkwan University, Suwon 16419, Republic of Korea 2 College of Software Sungkyunkwan University Suwon 16419, Republic of Korea

Sungkyunkwan University, Suwon 16419, Republic of Korea 2 College of Software Sungkyunkwan University Suwon 16419, Republic of Korea Kalpa Publications in Computing Volume 2, 2017, Pages 196 204 ICRISET2017. International Conference on Research and Innovations in Science, Engineering &Technology. Selected Papers in Computing Modeling

More information

A Fuzzy System based Approach to Extend Network Lifetime for En-Route Filtering Schemes in WSNs

A Fuzzy System based Approach to Extend Network Lifetime for En-Route Filtering Schemes in WSNs A Fuzzy System based Approach to Extend Network Lifetime for En-Route Filtering Schemes in WSNs M.K. Shahzad, Member, IEEE, L. Nkenyereye, Member, IEEE, S. M. Riazul Islam, Member, IEEE 1 Authors' Affiliations

More information

ENERGY-EFFICIENT PATH CONFIGURATION METHOD FOR DEF IN WSNS

ENERGY-EFFICIENT PATH CONFIGURATION METHOD FOR DEF IN WSNS ENERGY-EFFICIENT PATH CONFIGURATION METHOD FOR DEF IN WSNS Jae Kwon Lee, Su Man Nam and Tae Ho Cho School of Information and Communication Engineering Sungkyunkwan University, Su-won, 440-476, Republic

More information

A Secure Routing Method for Detecting False Reports and Wormhole Attacks in Wireless Sensor Networks *

A Secure Routing Method for Detecting False Reports and Wormhole Attacks in Wireless Sensor Networks * Wireless Sensor Network, 2013, 5, 33-40 http://dx.doi.org/10.4236/wsn.2013.53005 Published Online March 2013 (http://www.scirp.org/journal/wsn) A Secure Routing Method for Detecting False Reports and Wormhole

More information

TDMA-Based Detection of Packet Modification Attacks in Wireless Sensor Networks 1

TDMA-Based Detection of Packet Modification Attacks in Wireless Sensor Networks 1 , pp.40-46 http://dx.doi.org/10.14257/astl.2016.142.07 TDMA-Based Detection of Packet Modification Attacks in Wireless Sensor Networks 1 Hae Young Lee and Hyung-Jong Kim Department of Information Security

More information

An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks

An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu 1 Sanjeev Setia 1 Sushil Jajodia 1,2 1 Center for Secure Information Systems George Mason

More information

Chapter 55 Elimination of Black Hole and False Data Injection Attacks in Wireless Sensor Networks

Chapter 55 Elimination of Black Hole and False Data Injection Attacks in Wireless Sensor Networks Chapter 55 Elimination of Black Hole and False Data Injection Attacks in Wireless Sensor Networks R. Tanuja, M. K. Rekha, S. H. Manjula, K. R. Venugopal, S. S. Iyengar and L. M. Patnaik Abstract Wireless

More information

Mobile Agent Driven Time Synchronized Energy Efficient WSN

Mobile Agent Driven Time Synchronized Energy Efficient WSN Mobile Agent Driven Time Synchronized Energy Efficient WSN Sharanu 1, Padmapriya Patil 2 1 M.Tech, Department of Electronics and Communication Engineering, Poojya Doddappa Appa College of Engineering,

More information

Key establishment in sensor networks

Key establishment in sensor networks Security and Cooperation in Wireless Networks http://secowinet.epfl.ch/ key types; establishment of link keys using a shortterm master key; random key predistribution: - the basic scheme, and - some improvements;

More information

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures By Chris Karlof and David Wagner Lukas Wirne Anton Widera 23.11.2017 Table of content 1. Background 2. Sensor Networks vs. Ad-hoc

More information

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN Padmalaya Nayak V. Bhavani B. Lavanya ABSTRACT With the drastic growth of Internet and VLSI design, applications of WSNs are increasing

More information

Catching BlackHole Attacks in Wireless Sensor Networks

Catching BlackHole Attacks in Wireless Sensor Networks Catching BlackHole Attacks in Wireless Sensor Networks Ashish M 1 and Mr. Jason Martis 2 1 M. Tech, Department Of ISE, NMAM Institute of Technology, Nitte 2 Asst. Prof, Department Of ISE, NMAM Institute

More information

Key establishment in sensor networks

Key establishment in sensor networks Key establishment in sensor networks -- introduction to wireless sensor networks -- needed key types -- LEAP -- random key pre-distribution (c) Levente Buttyán (buttyan@crysys.hu) Wireless sensor networks

More information

Unpredictable Software-based Attestation Solution for Node Compromise Detection in Mobile WSN

Unpredictable Software-based Attestation Solution for Node Compromise Detection in Mobile WSN Unpredictable Software-based Attestation Solution for Node Compromise Detection in Mobile WSN Xinyu Jin, Rodrigo Jose Salmeron, Pasd Putthapipat, Niki Pissinou, Deng Pan, Jeffrey Fan Florida International

More information

Use of Symmetric And Asymmetric Cryptography in False Report Filtering in Sensor Networks

Use of Symmetric And Asymmetric Cryptography in False Report Filtering in Sensor Networks Use of Symmetric And Asymmetric Cryptography in False Report Filtering in Sensor Networks Aleksi Toivonen Helsinki University of Technology Aleksi.Toivonen@tkk.fi Abstract Sensor networks are easily deployable

More information

The Design and Evaluation of Interleaved Authentication for Filtering False Reports in Multipath Routing WSNs

The Design and Evaluation of Interleaved Authentication for Filtering False Reports in Multipath Routing WSNs The Design and Evaluation of Interleaved Authentication for Filtering False Reports in Multipath Routing WSNs Youtao Zhang a,, Jun Yang b, Hai T Vu c, Yizhi Wu d a Computer Science Department, University

More information

Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks

Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks Merve Şahin Sabancı University Istanbul, Turkey mervesahin@sabanciuniv.edu Abstract Key distribution is an important issue to provide

More information

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro

More information

Introducing a Routing Protocol Based on Fuzzy Logic in Wireless Sensor Networks

Introducing a Routing Protocol Based on Fuzzy Logic in Wireless Sensor Networks 2013, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.com Introducing a Routing Protocol Based on Fuzzy Logic in Wireless Sensor Networks Mostafa Vakili

More information

CFMTL: Clustering Wireless Sensor Network Using Fuzzy Logic and Mobile Sink In Three-Level

CFMTL: Clustering Wireless Sensor Network Using Fuzzy Logic and Mobile Sink In Three-Level CFMTL: Clustering Wireless Sensor Network Using Fuzzy Logic and Mobile Sink In Three-Level Ali Abdi Seyedkolaei 1 and Ali Zakerolhosseini 2 1 Department of Computer, Shahid Beheshti University, Tehran,

More information

Energy Efficient Probabilistic MAC Protocol for Minimizing Node Search Space and Access Time in Dense Wireless Networks

Energy Efficient Probabilistic MAC Protocol for Minimizing Node Search Space and Access Time in Dense Wireless Networks Energy Efficient Probabilistic MAC Protocol for Minimizing Node Search Space and Access Time in Dense Wireless Networks L. Sridhara Rao, 2 Dr. Md. Ali Hussain Research Scholar, Dept. of Computer Science,

More information

Path Renewal Method in Filtering Based Wireless Sensor Networks

Path Renewal Method in Filtering Based Wireless Sensor Networks Sensors 2011, 11, 1396-1404; doi:10.3390/s110201396 OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors Article Path Renewal Method in Filtering Based Wireless Sensor Networks Jin Myoung Kim

More information

ViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing

ViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing ViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing Jaekwang Kim Department of Electrical and Computer Engineering, Sungkyunkwan University, Suwon,

More information

Ms A.Naveena Electronics and Telematics department, GNITS, Hyderabad, India.

Ms A.Naveena Electronics and Telematics department, GNITS, Hyderabad, India. Dynamic Training Intrusion Detection Scheme for Blackhole Attack in MANETs Ms A.Naveena Electronics and Telematics department, GNITS, Hyderabad, India. Dr. K.Rama Linga Reddy Electronics and Telematics

More information

Selective Forwarding Attacks Detection in WSNs

Selective Forwarding Attacks Detection in WSNs Selective Forwarding Attacks Detection in WSNs Naser M. Alajmi and Khaled M. Elleithy Computer Science and Engineering Department, University of Bridgeport, Bridgeport, CT, USA nalajmi@my.bridgeport.edu,

More information

Secure Data Collection for Wireless Sensor Networks

Secure Data Collection for Wireless Sensor Networks Secure Data Collection for Wireless Sensor Networks Haengrae Cho 1 and Soo-Young Suck 2 1 Department of Computer Engineering, Yeungnam University, Republic of Korea 2 Department of R&D, Gyeongbuk Institute

More information

NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME

NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FOR ENERGY ENHANCEMENT OF WSNS USING A FUZZY SYSTEM Jae Kwon Lee and Tae Ho Cho School of Information Communication Engineering,

More information

Routing Scheme in Energy efficient based Protocols for Wireless Sensor Networks

Routing Scheme in Energy efficient based Protocols for Wireless Sensor Networks Routing Scheme in Energy efficient based Protocols for Wireless Sensor Networks 1 Chiranjeevi Rampilla, 2 Pallikonda Anil Kumar, 1 Student, DEPT.OF CSE, PVPSIT, KANURU, VIJAYAWADA. 2 Asst.Professor, DEPT.OF

More information

AN ENHANCED DETECTION AND ENERGY- EFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELESS SENSOR NETWORKS

AN ENHANCED DETECTION AND ENERGY- EFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELESS SENSOR NETWORKS AN ENHANCED DETECTION AND ENERGY- EFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELESS SENSOR NETWORKS Muhammad K. Shahzad 1 and Tae Ho Cho 1 1 School of Information and Communication Engineering, Sungkyunkwan

More information

An Energy Efficient Clustering in Wireless Sensor Networks

An Energy Efficient Clustering in Wireless Sensor Networks , pp.37-42 http://dx.doi.org/10.14257/astl.2015.95.08 An Energy Efficient Clustering in Wireless Sensor Networks Se-Jung Lim 1, Gwang-Jun Kim 1* and Daehyon Kim 2 1 Department of computer engineering,

More information

Compromised nodes in wireless sensor network 1

Compromised nodes in wireless sensor network 1 Compromised nodes in wireless sensor network 1 Lin Zhi-Ting, Qu Yu-Gui, Li Jing, Zhao Bao-Hua MOE-Microsoft Key Laboratory of Multimedia Computing and Communication, Department of Electronic Engineering

More information

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM Rajalakshmi 1, Umamaheswari 2 and A.Vijayaraj 3 1 Department

More information

Design Issues during Wireless Sensor Networks Deployment

Design Issues during Wireless Sensor Networks Deployment EUROPEAN ACADEMIC RESEARCH Vol. I, Issue 12/ March 2014 ISSN 2286-4822 www.euacademic.org Impact Factor: 3.1 (UIF) DRJI Value: 5.9 (B+) Design Issues during Wireless Sensor Networks Deployment SYED ABDUL

More information

Chapter 6 Route Alteration Based Congestion Avoidance Methodologies For Wireless Sensor Networks

Chapter 6 Route Alteration Based Congestion Avoidance Methodologies For Wireless Sensor Networks Chapter 6 Route Alteration Based Congestion Avoidance Methodologies For Wireless Sensor Networks Early studies shows that congestion avoid in wireless sensor networks (WSNs) is a critical issue, it will

More information

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN:

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN: Fast Data Collection with Reduced Interference and Increased Life Time in Wireless Sensor Networks Jayachandran.J 1 and Ramalakshmi.R 2 1 M.Tech Network Engineering, Kalasalingam University, Krishnan koil.

More information

A Time-Based Key Management Protocol for Wireless Sensor Networks

A Time-Based Key Management Protocol for Wireless Sensor Networks A Time-Based Key Management Protocol for Wireless Sensor Networks Jiyong Jang 1, Taekyoung Kwon 2, and Jooseok Song 1 1 Department of Computer Science, Yonsei University {souljang, jssong}@emerald.yonsei.ac.kr.

More information

A New Approach for Key Forwarding Scheme in WSN Using Mobile Sink

A New Approach for Key Forwarding Scheme in WSN Using Mobile Sink Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 3, March 2014,

More information

An Enhanced General Self-Organized Tree-Based Energy- Balance Routing Protocol (EGSTEB) for Wireless Sensor Network

An Enhanced General Self-Organized Tree-Based Energy- Balance Routing Protocol (EGSTEB) for Wireless Sensor Network www.ijecs.in International Journal Of Engineering And Computer Science ISSN: 239-7242 Volume 4 Issue 8 Aug 205, Page No. 3640-3643 An Enhanced General Self-Organized Tree-Based Energy- Balance Routing

More information

Performance Analysis of Heterogeneous Wireless Sensor Network in Environmental Attack

Performance Analysis of Heterogeneous Wireless Sensor Network in Environmental Attack International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 5 (2013), pp. 451-458 International Research Publications House http://www. irphouse.com /ijict.htm Performance

More information

Index terms Wireless Mesh networks, Selective forwarding attacks, Route Reply Packet, Fuzzy Logic, Detection threshold.

Index terms Wireless Mesh networks, Selective forwarding attacks, Route Reply Packet, Fuzzy Logic, Detection threshold. Volume 4, Issue 3, March 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Fuzzy Logic

More information

CASER Protocol Using DCFN Mechanism in Wireless Sensor Network

CASER Protocol Using DCFN Mechanism in Wireless Sensor Network Volume 118 No. 7 2018, 501-505 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu CASER Protocol Using DCFN Mechanism in Wireless Sensor Network A.Shirly

More information

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,

More information

False Data Filtering Strategy in Wireless Sensor Network Based on Neighbor Node Monitoring

False Data Filtering Strategy in Wireless Sensor Network Based on Neighbor Node Monitoring False Data Filtering Strategy in Wireless Sensor Network Based on Neighbor Node Monitoring https://doi.org/10.3991/ijoe.v13i03.6869 Haishan Zhang* North China University of Science and Technology, Tangshan,

More information

A Feedback-based Multipath Approach for Secure Data Collection in. Wireless Sensor Network.

A Feedback-based Multipath Approach for Secure Data Collection in. Wireless Sensor Network. A Feedback-based Multipath Approach for Secure Data Collection in Wireless Sensor Networks Yuxin Mao School of Computer and Information Engineering, Zhejiang Gongshang University, Hangzhou 310018, P.R

More information

Research on the Checkpoint Server Selection Strategy Based on the Mobile Prediction in Autonomous Vehicular Cloud

Research on the Checkpoint Server Selection Strategy Based on the Mobile Prediction in Autonomous Vehicular Cloud 2016 International Conference on Service Science, Technology and Engineering (SSTE 2016) ISBN: 978-1-60595-351-9 Research on the Checkpoint Server Selection Strategy Based on the Mobile Prediction in Autonomous

More information

Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks

Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks ISSN (e): 2250 3005 Vol, 05 Issue, 01 January 2015 International Journal of Computational Engineering Research (IJCER) Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks Si-Gwan

More information

Efficient Cluster Head Selection Method Based On K-means Algorithm to Maximize Energy of Wireless Sensor Networks

Efficient Cluster Head Selection Method Based On K-means Algorithm to Maximize Energy of Wireless Sensor Networks Efficient Cluster Head Selection Method Based On K-means Algorithm to Maximize Energy of Wireless Sensor Networks Miss Saba S. Jamadar 1, Prof. (Mrs.) D.Y. Loni 2 1Research Student, Department of Electronics

More information

Performance Analysis of MANET Routing Protocols OLSR and AODV

Performance Analysis of MANET Routing Protocols OLSR and AODV VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz

More information

Armor-LEACH for Wireless Sensor Network

Armor-LEACH for Wireless Sensor Network Armor-LEACH for Wireless Sensor Network M.A. Abuhelaleh T. M. Mismar A. A. Abuzneid School of Engineering, University of Bridgeport Bridgeport, CT 06604 {mabuhela, tmismar, abuzneid} @bridgeport.edu Abstract

More information

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION V. A. Dahifale 1, N. Y. Siddiqui 2 PG Student, College of Engineering Kopargaon, Maharashtra, India 1 Assistant Professor, College of Engineering

More information

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.

More information

Packet Routing using Optimal Flooding Protocol in Cluster based MANET

Packet Routing using Optimal Flooding Protocol in Cluster based MANET IJSTE - International Journal of Science Technology & Engineering Volume 2 Issue 09 March 2016 ISSN (online): 2349-784X Packet Routing using Optimal Flooding Protocol in Cluster based MANET S.Bavani V.Aiswariya

More information

A Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI

A Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com A Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI 1 Yongxian SONG, 2 Rongbiao ZHANG and Fuhuan

More information

LIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS

LIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS LIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS Mohammed A. Al-taha 1 and Ra ad A. Muhajjar 2 1 Department of Computer Science, College of Science, Basrah University, Iraq 2

More information

Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network

Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network 1 Ms.Anisha Viswan, 2 Ms.T.Poongodi, 3 Ms.Ranjima P, 4 Ms.Minimol Mathew 1,3,4 PG Scholar, 2 Assistant Professor,

More information

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(5): 48-52 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) Blackhole Attack

More information

A Simple Sink Mobility Support Algorithm for Routing Protocols in Wireless Sensor Networks

A Simple Sink Mobility Support Algorithm for Routing Protocols in Wireless Sensor Networks A Simple Mobility Support Algorithm for Routing Protocols in Wireless Sensor Networks Chun-Su Park, You-Sun Kim, Kwang-Wook Lee, Seung-Kyun Kim, and Sung-Jea Ko Department of Electronics Engineering, Korea

More information

Defending Against Resource Depletion Attacks in Wireless Sensor Networks

Defending Against Resource Depletion Attacks in Wireless Sensor Networks Defending Against Resource Depletion Attacks in Wireless Sensor Networks Cauvery Raju M. Tech, CSE IInd Year, JNNCE, Shimoga Abstract: One of the major challenges wireless sensor networks face today is

More information

Abstract. 1. Introduction

Abstract. 1. Introduction SOOAWSN: A complete framework for Wireless Sensor Networks Graduate Student Paper Mohammed A. Abuhelaleh and Khaled M. Elleithy School of Engineering University Of Bridgeport, Bridgeport, CT {mabuhela,

More information

DETECTING SYBIL ATTACK USING HYBRID FUZZY K-MEANS ALGORITHM IN WSN

DETECTING SYBIL ATTACK USING HYBRID FUZZY K-MEANS ALGORITHM IN WSN DETECTING SYBIL ATTACK USING HYBRID FUZZY K-MEANS ALGORITHM IN WSN 1 Shipra Diwakar, 2 Dr. R. Kashyup 1 Research Scholar, 2 HOD ECE Rayat Bahara University Ropar, Punjab ABSTRACT Security in Wireless Sensor

More information

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks William Shaw 1, Yifeng He 1, and Ivan Lee 1,2 1 Department of Electrical and Computer Engineering, Ryerson University, Toronto,

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

IMPROVEMENT OF FALSE REPORT DETECTION PERFORMANCE BASED ON INVALID DATA DETECTION USING NEURAL NETWORK IN WSN

IMPROVEMENT OF FALSE REPORT DETECTION PERFORMANCE BASED ON INVALID DATA DETECTION USING NEURAL NETWORK IN WSN IMPROVEMENT OF FALSE REPORT DETECTION PERFORMANCE BASED ON INVALID DATA DETECTION USING NEURAL NETWORK IN WSN Sanghyeok Lim and Taeho Cho Department of Electrical and Computer Engineering, Sungkyunkwan

More information

Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET

Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET International Journal of Scientific and Research Publications, Volume 3, Issue 5, May 2013 1 Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET Ms.T.R.Panke * M.B.E.S.College of

More information

MultiHop Routing for Delay Minimization in WSN

MultiHop Routing for Delay Minimization in WSN MultiHop Routing for Delay Minimization in WSN Sandeep Chaurasia, Saima Khan, Sudesh Gupta Abstract Wireless sensor network, consists of sensor nodes in capacity of hundred or thousand, which deployed

More information

Detection of Wormhole Attacks in Wireless Sensor Networks

Detection of Wormhole Attacks in Wireless Sensor Networks Detection of Wormhole Attacks in Wireless Sensor Networks Ms Shweta Dalke RGPV: Electronics & Communication,Truba College of Engineering & Technology,Indore,INDIA Ms Pallavi Pahadiya RGPV: Electronics

More information

Energy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2

Energy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2 Energy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2 1 Student Department of Electronics & Telecommunication, SITS, Savitribai Phule Pune University,

More information

Link-Based Wormhole Detection in Wireless Sensor Networks

Link-Based Wormhole Detection in Wireless Sensor Networks Link-Based Wormhole Detection in Wireless Sensor Networks Xiaoyuan Zhou, Lijun Chen National Key Laboratory for Novel Software Technology Nanjing University Nanjing, P.R. China, 2123 zxy@smail.nju.edu.cn,

More information

Level-By-Level Offset Based Wake up Pattern with Hybrid Data Gathering Protocol in a WSN

Level-By-Level Offset Based Wake up Pattern with Hybrid Data Gathering Protocol in a WSN Vol. 2, Special Issue 1, December 20 Level-By-Level Offset Based Wake up Pattern with Hybrid Data Gathering Protocol in a WSN Shilpa Alias 1, Simy M Baby 2 M. Tech Student, Dept. Applied Electronics, Ilahia

More information

An Energy Efficient Data Dissemination Algorithm for Wireless Sensor Networks

An Energy Efficient Data Dissemination Algorithm for Wireless Sensor Networks , pp.135-140 http://dx.doi.org/10.14257/astl.2014.48.22 An Energy Efficient Data Dissemination Algorithm for Wireless Sensor Networks Jin Wang 1, Bo Tang 1, Zhongqi Zhang 1, Jian Shen 1, Jeong-Uk Kim 2

More information

WIRELESS sensor networks have received a lot of attention

WIRELESS sensor networks have received a lot of attention IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 2, FEBRUARY 2006 395 Secure and Resilient Clock Synchronization in Wireless Sensor Networks Kun Sun, Peng Ning, Member, IEEE, and Cliff Wang,

More information

IMPROVING WIRELESS SENSOR NETWORK LIFESPAN THROUGH ENERGY EFFICIENT ALGORITHMS

IMPROVING WIRELESS SENSOR NETWORK LIFESPAN THROUGH ENERGY EFFICIENT ALGORITHMS IMPROVING WIRELESS SENSOR NETWORK LIFESPAN THROUGH ENERGY EFFICIENT ALGORITHMS 1 M.KARPAGAM, 2 DR.N.NAGARAJAN, 3 K.VIJAIPRIYA 1 Department of ECE, Assistant Professor, SKCET, Coimbatore, TamilNadu, India

More information

Effect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols

Effect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols Volume 1, Issue 3, October 2013 ISSN: 2320-9984 (Online) International Journal of Modern Engineering & Management Research Website: www.ijmemr.org Effect of Variable Bit Rate Traffic Models on the Energy

More information

@IJMTER-2016, All rights Reserved ,2 Department of Computer Science, G.H. Raisoni College of Engineering Nagpur, India

@IJMTER-2016, All rights Reserved ,2 Department of Computer Science, G.H. Raisoni College of Engineering Nagpur, India Secure and Flexible Communication Technique: Implementation Using MAC Filter in WLAN and MANET for IP Spoofing Detection Ashwini R. Vaidya 1, Siddhant Jaiswal 2 1,2 Department of Computer Science, G.H.

More information

A Survey on Underwater Sensor Network Architecture and Protocols

A Survey on Underwater Sensor Network Architecture and Protocols A Survey on Underwater Sensor Network Architecture and Protocols Rakesh V S 4 th SEM M.Tech, Department of Computer Science MVJ College of Engineering Bangalore, India raki.rakesh102@gmail.com Srimathi

More information

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks Stephen S. Yau, Wei Gao, and Dazhi Huang Dept. of Computer Science and Engineering Arizona State University Tempe,

More information

Enhancing Energy Efficiency in Wireless Sensor Networks via Improving Elliptic Curve Digital Signature Algorithm

Enhancing Energy Efficiency in Wireless Sensor Networks via Improving Elliptic Curve Digital Signature Algorithm World Applied Sciences Journal 21 (11): 1616-16, 13 ISSN 1818-4952 IDOSI Publications, 13 DOI:.5829/idosi.wasj.13.21.11.1661 Enhancing Energy Efficiency in Wireless Sensor Networks via Improving Elliptic

More information

Investigation on OLSR Routing Protocol Efficiency

Investigation on OLSR Routing Protocol Efficiency Investigation on OLSR Routing Protocol Efficiency JIRI HOSEK 1, KAROL MOLNAR 2 Department of Telecommunications Faculty of Electrical Engineering and Communication, Brno University of Technology Purkynova

More information

Reliable Broadcast Message Authentication in Wireless Sensor Networks

Reliable Broadcast Message Authentication in Wireless Sensor Networks Reliable Broadcast Message Authentication in Wireless Sensor Networks Taketsugu Yao, Shigeru Fukunaga, and Toshihisa Nakai Ubiquitous System Laboratories, Corporate Research & Development Center, Oki Electric

More information

Sensors & Transducers Published by IFSA Publishing, S. L.,

Sensors & Transducers Published by IFSA Publishing, S. L., Sensors & Transducers Published by IFSA Publishing, S. L., 2016 http://www.sensorsportal.com Compromises Between Quality of Service Metrics and Energy Consumption of Hierarchical and Flat Routing Protocols

More information

Analysis of Broadcast Authentication Mechanism in Selected Network Topologies

Analysis of Broadcast Authentication Mechanism in Selected Network Topologies RADIOENGINEERING, VOL. 20, NO. 1, APRIL 2011 167 Analysis of Broadcast Authentication Mechanism in Selected Network Topologies Tomas VANEK, Matej ROHLIK Dept. of Telecommunication Engineering, Czech Technical

More information

CSC 774 Advanced Network Security

CSC 774 Advanced Network Security CSC 774 Advanced Network Security Topic 7. Wireless Sensor Network Security Dr. Peng Ning CSC 774 Adv. Net. Security 1 Wireless Sensor Networks 1. Network protocol (e.g., routing) 2. Data management (e.g.,

More information

An Energy Efficient Routing Protocol for extending Lifetime of Wireless Sensor Networks by Transmission Radius Adjustment

An Energy Efficient Routing Protocol for extending Lifetime of Wireless Sensor Networks by Transmission Radius Adjustment An Energy Efficient Routing Protocol for extending Lifetime of Wireless Sensor Networks by Transmission Radius Adjustment Dr. K. Mohaideen Pitchai Department of Computer Science and Engineering, National

More information

Regression Based Cluster Formation for Enhancement of Lifetime of WSN

Regression Based Cluster Formation for Enhancement of Lifetime of WSN Regression Based Cluster Formation for Enhancement of Lifetime of WSN K. Lakshmi Joshitha Assistant Professor Sri Sai Ram Engineering College Chennai, India lakshmijoshitha@yahoo.com A. Gangasri PG Scholar

More information

Secured Routing Protocols for Wireless & ATM Networks : An Analysis

Secured Routing Protocols for Wireless & ATM Networks : An Analysis Secured Routing Protocols for Wireless & ATM Networks : An Analysis 1 Sanyam Agarwal, 2 Dr.A.K.Gautam 1 Research Scholar,Deptt. Of Electronics, India 116 2 S.D.College Of Engineering. & Technology, Deptt.

More information

Low-Energy-Consumption Ad Hoc Mesh Network Based on Intermittent Receiver-driven Transmission

Low-Energy-Consumption Ad Hoc Mesh Network Based on Intermittent Receiver-driven Transmission Low-Energy-Consumption Ad Hoc Mesh Network Based on Intermittent Receiver-driven Transmission Masashi Sugano 1, Ryo Fukushima 2, Masayuki Murata 2, Takayoshi Hayashi 3, Takaaki Hatauchi 3 1 School of Comprehensive

More information

Specification-based Intrusion Detection. Michael May CIS-700 Fall 2004

Specification-based Intrusion Detection. Michael May CIS-700 Fall 2004 Specification-based Intrusion Detection Michael May CIS-700 Fall 2004 Overview Mobile ad hoc networking (MANET) new area of protocols Some old networking solutions work (TCP/IP) but things change with

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM R.Bhuvaneswari 1, V.Vijayalakshmi 2 1 M.Phil., Scholar, Bharathiyar Arts And Science College For Women, India 2 HOD

More information

Reliable Time Synchronization Protocol for Wireless Sensor Networks

Reliable Time Synchronization Protocol for Wireless Sensor Networks Reliable Time Synchronization Protocol for Wireless Sensor Networks Soyoung Hwang and Yunju Baek Department of Computer Science and Engineering Pusan National University, Busan 69-735, South Korea {youngox,yunju}@pnu.edu

More information

Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report

Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report Mandadapu Sravya M.Tech, Department of CSE, G. Narayanamma Institute of Technology and Science. Ch.Mandakini

More information

A Survey On Attacks, Challenges and Security Mechanisms In Wireless Sensor Network

A Survey On Attacks, Challenges and Security Mechanisms In Wireless Sensor Network IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 8 January 2015 ISSN (online): 2349-6010 A Survey On Attacks, Challenges and Security Mechanisms In Wireless Sensor

More information

AN ENHANCED SECURE ROUTING ALGORITHM AGAINST SINKHOLE ATTACK IN WIRELESS SENSOR NETWORKS

AN ENHANCED SECURE ROUTING ALGORITHM AGAINST SINKHOLE ATTACK IN WIRELESS SENSOR NETWORKS AN ENHANCED SECURE ROUTING ALGORITHM AGAINST SINKHOLE ATTACK IN WIRELESS SENSOR NETWORKS 1 VANDANA SALVE, 2 LEENA RAGHA, 3 NILESH MARATHE 1,2,3 Computer Department, 1,2,3 Ramrao Adik Institute of technology,

More information

Energy Efficient Intrusion Detection System for ZigBee based Wireless Sensor Networks

Energy Efficient Intrusion Detection System for ZigBee based Wireless Sensor Networks Received: February 9, 207 55 Energy Efficient Intrusion Detection System for ZigBee based Wireless Sensor Networks Jegan Govindasamy * Samundiswary Punniakodi Department of Electronics Engineering Pondicherry

More information

Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study

Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study M. Tarique, A. Hossain, R. Islam and C. Akram Hossain Dept. of Electrical and Electronic Engineering, American

More information